netns does not have names. iproute2 uses names (a filename in fact, to hold a
On May 5, 2014 3:36:38 PM PDT, Serge Hallyn <serge.hallyn@xxxxxxxxxx> wrote:
Quoting James Bottomley (James.Bottomley@xxxxxxxxxxxxxxxxxxxxx):
On Mon, 2014-05-05 at 22:27 +0000, Serge Hallyn wrote:(James.Bottomley@xxxxxxxxxxxxxxxxxxxxx):
Quoting James Bottomley (James.Bottomley@xxxxxxxxxxxxxxxxxxxxx):
On Mon, 2014-05-05 at 17:48 -0400, Richard Guy Briggs wrote:
On 14/05/05, Serge E. Hallyn wrote:
Quoting James Bottomley
wrote:On Tue, 2014-04-22 at 14:12 -0400, Richard Guy Briggs
involved in migration of aQuestions:
Is there a way to link serial numbers of namespaces
CRIU.) Is there a uniquecontainer to another kernel? (I had a brief look at
least some identifieridentifier for each running instance of a kernel? Or at
container from anwithin the container migration realm?
Are you asking for a way of distinguishing an migrated
job ofunmigrated one? The answer is pretty much "no" because the
possible.migration is to restore to the same state as much as
correlate audit
Reading between the lines, I think your goal is to
the managementinformation across a container migration, right? Ideally
containersystem should be able to cough up an audit trail for a
migrated?wherever it's running and however many times it's been
in a dense
In that case, I think your idea of a numeric serial number
obviously never goingrange is wrong. Because the range is dense you're
migration. However,to be able to use the same serial number across a
this pretty
Ah, but I was being silly before, we can actually address
serial numbersimply. If we just (for instance) add
/proc/self/ns/{ic,mnt,net,pid,user,uts}_seq containing the
info atfor the relevant ns for the task, then criu can dump this
task andcheckpoint. Then at restart it can dump an audit message per
log readerns saying old_serial=%x,new_serial=%x. That way the audit
There arecan if it cares keep track.
This is the sort of idea I had in mind...
OK, but I don't understand then why you need a serial number.
name forplenty of things we preserve across a migration, like namespace
think Iinstance. Could you explain what function it performs because I
containermight be missing something.
We're looking ahead to a time when audit is namespaced, and a
ofcan keep its own audit logs (without limiting what the host audits
migrated,course). So if a container is auditing suspicious activity by some
task in a sub-namesapce, then the whole parent container gets
namespaces.after migration we want to continue being able to correlate the
We
We're also looking at audit trails on a host that is up for years.
whywould like every namespace to be uniquely logged there. That is
generationinode #s on /proc/self/ns/* are not sufficient, unless we add a
has# (which would end more complicated, not less, than a serial #).
Right, but when the contaner has an audit namespace, that namespace
a name,
What ns has a name?
The netns for instance.